Adrian Dabrowski

is researcher at SBA Research.Adrian

  • E-Mail
  • Phone: +43 (1) 505 36 88
  • Fax: +43 (1) 505 88 88
  • PGP ID: 0xDB1E4E76
  • PGP Fingerprint: 43EC 0F2B 8881 E26F 62A5 013F 7959 474F DB1E 4E76
  • Google Scholar

Research Interest

His research interests cover RFID, cyberphysical security, hardware security and privacy enhancing technologies.

Bio

Adrian Dabrowski graduated from TU Wien and is currently a PhD candidate. He participated and later organized the Viennese iCTF team, winning two times. He received the IEEE Austria Diploma Thesis Award and was nominated for the Distinguished Young Alumnus Award of the Faculty of Informatics, UT Vienna. His ACSAC 2014 paper won the Best Student Paper Award.

Before that, he made several media appearances concerning security of systems in public use and taught part-time at a technical high school. He has been speaker at several Computer Chaos Club (CCC) conferences, as well as SIGINT, B-Sides, PrivacyOS and Forum Alpbach. In spring 2013 and winter 2014/15, he visited the Echizen Group at the National Institute of Informatics in Tokyo.

Publications

  • Adrian Dabrowski and Nicola Pianta and Thomas Klepp and Martin Schmiedecker and Edgar R. Weippl, "IMSI-Catch Me If You Can: IMSI-Catcher-Catchers," in Annual Computer Security Applications Conference (ACSAC), 2014. BibTeX | PDF | Src
    @INPROCEEDINGS{Dabrowski2014IMSICatch,
      Author = {Adrian Dabrowski and Nicola Pianta and Thomas Klepp and Martin Schmiedecker and {Edgar R.} Weippl},
      sbahotlist = {true},
      title = {IMSI-Catch Me If You Can: IMSI-Catcher-Catchers},
      booktitle = {Annual Computer Security Applications Conference (ACSAC)},
      year = {2014},
      month = {12},
      pdf = {DabrowskiEtAl-IMSI-Catcher-Catcher-ACSAC2014.pdf},
      link_source = {http://sourceforge.net/p/icc/},
      }
  • Adrian Dabrowski and Katharina Krombholz and Johanna Ullrich and Edgar R. Weippl, "QR – Inception: Barcode in Barcode Attacks," in 4th Annual ACM CCS Workshop on Security and Privacy in Smartphones and Mobile Devices (SPSM), 2014. BibTeX | PDF | Slides
    @INPROCEEDINGS{Dabrowski2014Inception,
      Author = {Adrian Dabrowski and Katharina Krombholz and Johanna Ullrich and {Edgar R.} Weippl},
      title = {QR - Inception: Barcode in Barcode Attacks},
      booktitle = {4th Annual ACM CCS Workshop on Security and Privacy in Smartphones and Mobile Devices (SPSM)},
      year = {2014},
      month = {11},
      pdf = {qrinception.pdf},
      link_slides = {http://www.slideshare.net/SBAResearch/qrinception-barcode-in-barcode-attacks},
      }
  • Johanna Ullrich and Katharina Krombholz and Heidelinde Hobel and Adrian Dabrowski and Edgar R. Weippl, "IPv6 Security: Attacks and Countermeasures in a Nutshell," in 8th USENIX Workshop on Offensive Technologies (WOOT), 2014. BibTeX | PDF | Slides
    @INPROCEEDINGS{Ullrich2014IPv6,
      Author = {Johanna Ullrich and Katharina Krombholz and Heidelinde Hobel and Adrian Dabrowski and {Edgar R.} Weippl},
      title = {IPv6 Security: Attacks and Countermeasures in a Nutshell},
      booktitle = {8th USENIX Workshop on Offensive Technologies (WOOT)},
      year = {2014},
      month = {8},
      pdf = {Johanna IPv6.pdf},
      link_slides = {http://de.slideshare.net/SBAResearch/ipv6-security-attacks-and-countermeasures-in-a-nutshell},
      }
  • Christian Krieg and Adrian Dabrowski and Heidelinde Hobel and Katharina Krombholz and Edgar R. Weippl, "Hardware Malware," Synthesis Lectures on Information Security, Privacy, and Trust, vol. 4, pp. 1-115, 2013. BibTeX
    @ARTICLE{Krieg2013Hardware,
      Author = {Christian Krieg and Adrian Dabrowski and Heidelinde Hobel and Katharina Krombholz and {Edgar R.} Weippl},
      title = {Hardware Malware},
      journal = {Synthesis Lectures on Information Security, Privacy, and Trust},
      year = {2013},
      month = {11},
      volume = {4},
      pages = {1-115},
      }

View all publications

  • Adrian Dabrowski and Georg Merzdovnik and Nikolaus Kommenda and Edgar R. Weippl, "Browser History Stealing with Captive Wi-Fi Portals," in Proceedings of Workshops at IEEE Security & Privacy 2016, Mobile Security Technologies (MoST), 2016. BibTeX | PDF
    @INPROCEEDINGS{Dabrowski2016Browser,
      Author = {Adrian Dabrowski and Georg Merzdovnik and Nikolaus Kommenda and {Edgar R.} Weippl},
      title = {Browser History Stealing with Captive Wi-Fi Portals},
      booktitle = {Proceedings of Workshops at IEEE Security & Privacy 2016, Mobile Security Technologies (MoST)},
      year = {2016},
      month = {5},
      pdf = {https://www.sba-research.org/wp-content/uploads/publications/Dabrowski2016Browser.pdf},
      }
  • Katharina Krombholz and Adrian Dabrowski and Matthew Smith and Edgar R. Weippl, "Ok Glass, Leave me Alone: Towards a Systematization of Privacy Enhancing Technologies for Wearable Computing," in 1st Workshop on Wearable Security and Privacy, 2015. BibTeX | PDF
    @INPROCEEDINGS{Krombholz2015Glass,
      Author = {Katharina Krombholz and Adrian Dabrowski and Matthew Smith and {Edgar R.} Weippl},
      title = {Ok Glass, Leave me Alone: Towards a Systematization of Privacy Enhancing Technologies for Wearable Computing},
      booktitle = {1st Workshop on Wearable Security and Privacy},
      year = {2015},
      month = {1},
      pdf = {Ok Glass.pdf},
      }
  • Johanna Ullrich and Katharina Krombholz and Heidelinde Hobel and Adrian Dabrowski and Edgar R. Weippl, "IPv6 Security: Attacks and Countermeasures in a Nutshell," Magdeburger Journal zur Sicherheitsforschung, vol. 1, 2015. BibTeX | PDF
    @ARTICLE{Ullrich2015IPv6,
      Author = {Johanna Ullrich and Katharina Krombholz and Heidelinde Hobel and Adrian Dabrowski and {Edgar R.} Weippl},
      title = {IPv6 Security: Attacks and Countermeasures in a Nutshell},
      journal = {Magdeburger Journal zur Sicherheitsforschung},
      year = {2015},
      month = {3},
      pdf = {http://www.sicherheitsforschung-magdeburg.de/uploads/journal/MJS_035_Ullrich_IPv6.pdf},
      volume = {1},
      }
  • Adrian Dabrowski and Isao Echizen and Edgar R. Weippl, "Error-Correcting Codes as Source for Decoding Ambiguity," in LangSec Workshop at IEEE Security & Privacy, 2015. BibTeX | PDF
    @INPROCEEDINGS{Dabrowski2015ErrorCorrecting,
      Author = {Adrian Dabrowski and Isao Echizen and {Edgar R.} Weippl},
      title = {Error-Correcting Codes as Source for Decoding Ambiguity},
      booktitle = {LangSec Workshop at IEEE Security & Privacy},
      year = {2015},
      month = {21},
      pdf = {ecc.pdf},
      volume = {10},
      }
  • Adrian Dabrowski and Markus Kammerstetter and Eduard Thamm and Edgar R. Weippl and Wolfgang Kastner, "Leveraging Competitive Gamification for Sustainable Fun and Profit in Security Education," in USENIX Summit on Gaming, Games and Gamification in Security Education (3GSE 2015) at USENIX Security Symposiom 2015, 2015. BibTeX
    @INPROCEEDINGS{Dabrowski2015Leveraging,
      Author = {Adrian Dabrowski and Markus Kammerstetter and Eduard Thamm and {Edgar R.} Weippl and Wolfgang Kastner},
      title = {Leveraging Competitive Gamification for Sustainable Fun and Profit in Security Education},
      booktitle = {USENIX Summit on Gaming, Games and Gamification in Security Education (3GSE 2015) at USENIX Security Symposiom 2015},
      year = {2015},
      month = {8},
      }
  • Adrian Dabrowski and Katharina Krombholz and Edgar R. Weippl and Isao Echizen, "Smart Privacy Visor: Bridging the Privacy Gap," in Workshop on Privacy by Transparency in Data-Centric Services (BIS 2015), 2015. BibTeX
    @INPROCEEDINGS{Dabrowski2015Smart,
      Author = {Adrian Dabrowski and Katharina Krombholz and {Edgar R.} Weippl and Isao Echizen},
      title = {Smart Privacy Visor: Bridging the Privacy Gap},
      booktitle = {Workshop on Privacy by Transparency in Data-Centric Services (BIS 2015)},
      year = {2015},
      month = {6},
      }
  • Adrian Dabrowski and Nicola Pianta and Thomas Klepp and Martin Schmiedecker and Edgar R. Weippl, "IMSI-Catch Me If You Can: IMSI-Catcher-Catchers," in Annual Computer Security Applications Conference (ACSAC), 2014. BibTeX | PDF | Src
    @INPROCEEDINGS{Dabrowski2014IMSICatch,
      Author = {Adrian Dabrowski and Nicola Pianta and Thomas Klepp and Martin Schmiedecker and {Edgar R.} Weippl},
      sbahotlist = {true},
      title = {IMSI-Catch Me If You Can: IMSI-Catcher-Catchers},
      booktitle = {Annual Computer Security Applications Conference (ACSAC)},
      year = {2014},
      month = {12},
      pdf = {DabrowskiEtAl-IMSI-Catcher-Catcher-ACSAC2014.pdf},
      link_source = {http://sourceforge.net/p/icc/},
      }
  • Adrian Dabrowski and Heidelinde Hobel and Johanna Ullrich and Katharina Krombholz and Edgar R. Weippl, "Towards a Hardware Trojan Detection Cycle," in Second International Workshop on Emerging Cyberthreats and Countermeasures, ARES ECTCM 2014, 2014. BibTeX | PDF
    @INPROCEEDINGS{Dabrowski2014Towards,
      Author = {Adrian Dabrowski and Heidelinde Hobel and Johanna Ullrich and Katharina Krombholz and {Edgar R.} Weippl},
      sbahotlist = {true},
      title = {Towards a Hardware Trojan Detection Cycle},
      booktitle = {Second International Workshop on Emerging Cyberthreats and Countermeasures, ARES ECTCM 2014},
      year = {2014},
      month = {9},
      pdf = {towards a hardware trojan _paper.pdf},
      }
  • Alberto Escalada Jimenez and Adrian Dabrowski and Juan M. Montero Martinez and Isao Echizen, "Tag Detection for Preventing Unauthorized Face Image Processing," in Proceedings of the 13th International Workshop on Digital-Forensics and Watermarking (IWDW 2014), 2014. BibTeX | PDF
    @INPROCEEDINGS{Jimenez2014Detection,
      Author = {{Alberto Escalada} Jimenez and Adrian Dabrowski and {Juan M.} {Montero Martinez} and Isao Echizen},
      title = {Tag Detection for Preventing Unauthorized Face Image Processing},
      booktitle = {Proceedings of the 13th International Workshop on Digital-Forensics and Watermarking (IWDW 2014)},
      year = {2014},
      month = {10},
      pdf = {judmayer_KNX_wfcs2014.pdf},
      }
  • Adrian Dabrowski and Katharina Krombholz and Johanna Ullrich and Edgar R. Weippl, "QR – Inception: Barcode in Barcode Attacks," in 4th Annual ACM CCS Workshop on Security and Privacy in Smartphones and Mobile Devices (SPSM), 2014. BibTeX | PDF | Slides
    @INPROCEEDINGS{Dabrowski2014Inception,
      Author = {Adrian Dabrowski and Katharina Krombholz and Johanna Ullrich and {Edgar R.} Weippl},
      title = {QR - Inception: Barcode in Barcode Attacks},
      booktitle = {4th Annual ACM CCS Workshop on Security and Privacy in Smartphones and Mobile Devices (SPSM)},
      year = {2014},
      month = {11},
      pdf = {qrinception.pdf},
      link_slides = {http://www.slideshare.net/SBAResearch/qrinception-barcode-in-barcode-attacks},
      }
  • Adrian Dabrowski and Peter Fejes and Johanna Ullrich and Katharina Krombholz and Heidelinde Hobel and Edgar R. Weippl, "Poster NDSS 2014: Hardware Trojans–Detect and React?," Network and Distributed System Security (NDSS) Symposium 2014, 2014. BibTeX
    @ARTICLE{Dabrowski2014Poster,
      Author = {Adrian Dabrowski and Peter Fejes and Johanna Ullrich and Katharina Krombholz and Heidelinde Hobel and {Edgar R.} Weippl},
      title = {Poster NDSS 2014: Hardware Trojans--Detect and React?},
      journal = {Network and Distributed System Security (NDSS) Symposium 2014},
      year = {2014},
      month = {2},
      }
  • Johanna Ullrich and Katharina Krombholz and Heidelinde Hobel and Adrian Dabrowski and Edgar R. Weippl, "IPv6 Security: Attacks and Countermeasures in a Nutshell," in 8th USENIX Workshop on Offensive Technologies (WOOT), 2014. BibTeX | PDF | Slides
    @INPROCEEDINGS{Ullrich2014IPv6,
      Author = {Johanna Ullrich and Katharina Krombholz and Heidelinde Hobel and Adrian Dabrowski and {Edgar R.} Weippl},
      title = {IPv6 Security: Attacks and Countermeasures in a Nutshell},
      booktitle = {8th USENIX Workshop on Offensive Technologies (WOOT)},
      year = {2014},
      month = {8},
      pdf = {Johanna IPv6.pdf},
      link_slides = {http://de.slideshare.net/SBAResearch/ipv6-security-attacks-and-countermeasures-in-a-nutshell},
      }
  • Adrian Dabrowski and Edgar R. Weippl and Isao Echizen, "Framework based on Privacy Policy Hiding for Preventing Unauthorized Face Image Processing," in Proceedings of the 2013 IEEE International Conference on Systems, Man, and Cybernetics (SMC2013), 2013. BibTeX
    @INPROCEEDINGS{Dabrowski2013Framework,
      Author = {Adrian Dabrowski and {Edgar R.} Weippl and Isao Echizen},
      title = {Framework based on Privacy Policy Hiding for Preventing Unauthorized Face Image Processing},
      booktitle = {Proceedings of the 2013 IEEE International Conference on Systems, Man, and Cybernetics (SMC2013)},
      year = {2013},
      month = {10},
      }
  • Christian Krieg and Adrian Dabrowski and Heidelinde Hobel and Katharina Krombholz and Edgar R. Weippl, "Hardware Malware," Synthesis Lectures on Information Security, Privacy, and Trust, vol. 4, pp. 1-115, 2013. BibTeX
    @ARTICLE{Krieg2013Hardware,
      Author = {Christian Krieg and Adrian Dabrowski and Heidelinde Hobel and Katharina Krombholz and {Edgar R.} Weippl},
      title = {Hardware Malware},
      journal = {Synthesis Lectures on Information Security, Privacy, and Trust},
      year = {2013},
      month = {11},
      volume = {4},
      pages = {1-115},
      }

Further website

See also http://www.iseclab.org/people/atrox/